What is cyber terrorism

Assignment Help Computer Network Security
Reference no: EM132704126

Question 1: What is the purpose of using firewall in our network? Give an example, how does a firewall work? Explain the strengths and weaknesses of a firewall. State a situation in which you feel that the firewall is adequate and in which it might be inadequate.

Question 2: On August 15, 2020, the world's largest cruise line operator, Carnival Corporation reported a data breach due to a ransomware attack that breached and encrypted one of its brand's IT infrastructure. Following the attack, the cruise line operator notified law enforcement and hired legal counsel and cyber security experts and launched an investigation. As a part of the investigation team, your job is to create an IT disaster recovery plan for an organization, what are the main points you need to address, give an example. What do you mean by the ethics of online investigations? Do you feel these investigations are invasion of privacy? Why or why not? Explain.

Question 3

Suppose Alice and Bob are sending packets to each other over a 5G communication network. Suppose Trudy positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice.
(a) List some of the malicious things Trudy can do from this position
(b) List some activities Alic and Bob can do to inspect network traffic, accept or reject packets from their IP Address
(c) Recommend some precautions in terms of network management, that Alice and Bob could do to trace whether Turdy is in the middle or not.

Question 4

Name five recent virus and five anti-virus software. In a web browser, what kind of information does the cookies store? Do you think these cookies can invade privacy? why/why-not explain

Question 5
Amazon Web Services (AWS) reports that in February 2020, they defended against a 2.3 -terabit-per-second (Tbps) distributed denial of service (DDoS) attack. As a cyber security engineer name some tools (hardware/software) you recommend to use in analyzing the attack vector. Briefly explain, how you can use security engineering tools (Use-Case diagram and matrix) in analyzing this DDoS attack. Explain how you might have defended against that specific attack.

Question 6
What do you mean by a simple network management protocol (SNMP)? As a part of network error management, can you filter packets captured by a software ( e.g. Wireshark) and HTTP request method, briefly explain below two figures in terms of network error management:

Question 7

In this COVID-19 global pandemic, active phishing campaigns have surfaced, some with the keylogger automatically installed through a email attachment. Name some good and some bad use of a keylogger?, How does a key logger behaves on network and data security? Does an antispyware software detect a key logger? explain.

Question 8

In order to generate a trace of IP datagrams, we can use the traceroute program to send datagrams of different sizes towards some destination, X. Briefly explain the steps in capturing packets from an execution of traceroute.
Given the following ICMP Echo Request (Figure 4.1 shown below, pkt size = 2000, second fragment), identify the following:

• What is the IP address of the computer?
• Within the IP packet header, what is the value in the upper layer protocol field?
• How many bytes are in the IP header? How many bytes are in the payload of the IP datagram?
• Has this IP datagram been fragmented?
• Which fields in the IP datagram always change and which fields stay constant? Describe the pattern you see in the values in the Identification field of the IP datagram.

Question 9

What is Cyber Terrorism? Name and explain two major damages that can cause due to a Cyber attack.
"The Internet is a valuable investigative resource"- Explain this statement in a cyber-detective's points of view.

Question 10

Consider that Host A is sending Host B a large file over a TCP connection. Assume Host B has no data to send Host A. Host B will not send acknowledgments to Host A because Host B cannot piggyback the acknowledgments on data. If it is true and Host A is transferring an enormous file of L bytes to Host B (assume an MSS of 536 bytes), what is the maximum value of L such that TCP sequence numbers are not exhausted? Recall that the TCP sequence number field has 4 bytes. Also, find how long it takes to transmit the file. Assume that a total of 66 bytes of transport, network, and data-link header are added to each segment before the resulting packet is sent out over a 155 Mbps link. Ignore flow control and congestion control so A can pump out the segments back to back and continuously.
Given the following TCP tracing (figure 3.1) shown below, answer the following questions:
• What is the length of each of the first six TCP segments?
• What is the minimum amount of available buffer space advertised at the received for the entire trace?
• Are there any retransmitted segments in the trace file? What did you check for (in the trace) in order to answer this question?
• What is the throughput (bytes transferred per unit time) for the TCP connection? Explain how you calculated this value.

Attachment:- Cyber Security.rar

Reference no: EM132704126

Questions Cloud

Determine the total compensation cost pertaining to the rsu : Determine the total compensation cost pertaining to the RSUs. (Show calculations, label each amount, and round amounts to the nearest whole dollar.)
What are you hoping to do with your research : Why are you writing this paper? What is the goal your paper? What are you hoping to do with your research? Why do you care and why should your audience care?
Explain evaluation and management : Code the appropriate codes for the encounter. You may assume this patient has been a patient at this facility before.
What is employement income of albert : What is employement income of Albert? Albert earned $85,000 during his employment with Glass Co. CPP contributions of $2,898 and EI of $856.
What is cyber terrorism : What is Cyber Terrorism? Name and explain two major damages that can cause due to a Cyber attack and Within the IP packet header, what is the value
What is business income of albert : What is business income of Albert? Albert also had a sole proprietorship that made personal protective equipment- specifically cloth masks
Discuss the nursing intervention to a patient population : Review your problem or issue and the study materials to formulate a PICOT question for your capstone project change proposal. A PICOT question starts with.
Difference between motor control and muscular response : What is the difference between motor control and muscular response?
Explain gastrovascular cavity and alimentary canal : What is the structure difference between the gastrovascular cavity and the alimentary canal? which one is more efficient for the digestion of larger prey

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd